header-logo
Suggest Exploit
explore-vulnerabilities

Explore Vulnerabilities

Version
Year

Explore all Exploits:

Oxygen <= 1.1.3 (O2PHP Bulletin Board) SQL Injection

A vulnerability in Oxygen <= 1.1.3 (O2PHP Bulletin Board) allows an attacker to inject arbitrary SQL commands via the 'viewthread.php' script. This can be exploited to manipulate SQL queries by e.g. injecting arbitrary 'uid' values. This can be exploited to disclose the MD5 hash of a user's password.

dicshunary 0.1 alpha Remote File Inclusion Vulnerability

dicshunary 0.1 alpha is prone to a remote file inclusion vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker can exploit this issue to execute arbitrary PHP code in the context of the webserver process. This may facilitate unauthorized access or privilege escalation; other attacks are also possible.

MosReporter Joomla Component Remote File Inclusion Exploit

This exploit allows an attacker to execute arbitrary code on the vulnerable server by including a remote file. The vulnerability exists due to insufficient sanitization of user-supplied input to the 'mosConfig_absolute_path' parameter in the 'components/com_reporter/reporter.logic.php' script.

The bbrss plugin for PhpBB is prone to a remote file-include vulnerability

An attacker can exploit this issue to include an arbitrary remote file containing malicious PHP code and execute it in the context of the webserver process. This may allow the attacker to compromise the application and the underlying system; other attacks are also possible.

mxBB calsnails module 1.06 Remote File Inclusion Vulnerability

A vulnerability exists in mxBB calsnails module 1.06 which allows a remote attacker to include a file from a remote host. The vulnerability is due to the 'module_root_path' parameter in 'includes/mx_common.php' script not properly sanitized before being used in a 'include_once' function call. This can be exploited to include arbitrary files from remote hosts by e.g. passing a URL in the 'module_root_path' parameter.

Powie’s PHP MatchMaker <= v4.05 (matchdetail) Remote SQL Injection Exploit

An attacker can exploit this vulnerability by sending a crafted HTTP request to the vulnerable application. The attacker can inject arbitrary SQL code in the vulnerable parameter 'edit' of the 'matchdetail.php' script. This can be used to extract data from the database, modify data, delete data, or even execute administration operations on the database.

Powie’s PHP Forum <= v1.29a (editpoll) Remote SQL Injection Exploit

The vulnerability exists due to insufficient sanitization of user-supplied input in 'editpoll.php' script. A remote attacker can send a specially crafted HTTP request with malicious SQL statements to the vulnerable script and execute arbitrary SQL commands in application's database. This can be exploited to bypass authentication and gain access to the administrative panel.

Geeklog Multiple Input-Validation Vulnerabilities

Geeklog is prone to multiple input-validation vulnerabilities. The issues include cross-site scripting and SQL-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input. A successful exploit of these vulnerabilities could allow an attacker to compromise the application, access or modify data, steal cookie-based authentication credentials, or even exploit vulnerabilities in the underlying database implementation. Other attacks are also possible.

Recent Exploits: